Cyber Security Engineers (4)

Latest Job -
Latest Job –

Company Name: DIGISS LLC

Company Location: Lagos, Nigeria.

Job Details

Seniority Level

Mid-Senior level


Information Technology & Services 

Computer Software

 Security & Investigations

Employment Type


Job Functions



Information Technology


Cloud Security

Security Audits


Computer Science

Application Security

Network Security

Vulnerability Scanning

Security Information and Event Management (SIEM)

Information Security

Amazon Web Services (AWS)

At Digiss we are dedicated to tackling every day cyber security challenges. Through continuous understanding of the evolving tactics and techniques of cyber adversaries, we’re able to implement effective countermeasures designed to significantly thwart them. Our business-aligned cyber security consulting and fraud intelligence services are guaranteed to provide measurable value to any organization that relies on us for solution to their seemingly complex cyber-related challenges. 

Job Summary

Does the idea of thwarting cyber adversaries interest you? Would you like to play a part in changing the Nigerian narrative from “the source of cyber badness” to “the source of cyber talents”? If so, then you are whom Digiss is looking for. Every day, we take a step toward realizing our vision of becoming a globally trusted provider of business-aligned cyber security services. To that end, we’re now seeking cyber security engineers to join our cyber talent pool and work on contract basis leading implementation and support of cyber security products across IT environments of our local and global clients.


  • Work closely with security architects to translate logical abstractions into security mechanisms required to support and defend the business
  • Deploy and support multiple cyber security technology products in line with service level agreement (SLA)
  • Conduct controls gap analysis to identify infrastructural weaknesses and lead the effort to remediate and validate remediation of findings
  • Actualize full implementation of security solutions across multiple domains such as application security, cloud security, data protection, endpoint security, identity and access management, network security, and security events monitoring and management
  • Create implementation and support guides for a wide variety of security technology products
  • Play a lead role in the design and execution of vulnerability assessments, penetration tests and security audits

Essential Skills:

  • Must be able to produce high-quality reports that can be understood by technical and non-technical audience
  • Subject matter expertise in security technology products across at least two of the following defense-in-depth domains – cloud security, data protection, endpoint security, identity and access management, network security, vulnerability scanning, and security information and events management (SIEM)
  • Demonstrable experience identifying, articulating and treating cyber security risks
  • Experience supporting multiple projects and working with multi-disciplinary departments while delivering cyber security solutions
  • Awareness of data privacy regulations such as GDPR, NDPR, CCPA, and their implications for a wide range of clients
  • Awareness of commonly adopted cyber security models, frameworks and methodologies in relation to the ever-evolving threat landscape
  • Working knowledge of various publicly available cyber posture assessment and threat intelligence gathering tools

Experience and Qualifications

  • Bachelor’s degree in computer science, information systems, engineering or a related field is required
  • At least one of the following certifications: CISSP, AWS CSA, CCSP, CCSK, OSCP, SANS GCCC, GCED or GSEC is required
  • Must have minimum of 3 years’ experience in at least two core domains of cyber security
  • Strong understanding of cloud security and experience leading digital transformation initiatives from an information security standpoint is desired
  • Must have a proven track record of validating implementation of cloud security requirements in cloud, on-premise, and hybrid deployments
  • Demonstrable experience identifying and communicating security weaknesses in legacy deployments is desired
  • Must possess a good understanding of appropriate leading edge cyber security technologies and be able to configure, deploy and support a wide range of cyber security tools
  • Demonstrable ability to skillfully transfer knowledge to colleagues and coach junior professionals

Additional Information

Learn more about Digiss resource pooling model at:

How to apply:

Enhance your chances by remodeling your Cover Letter / Resume before applying Click here to get started

Go to to apply.

Leave a Comment

Your email address will not be published. Required fields are marked *